{"id":"https://openalex.org/W3212572738","doi":"https://doi.org/10.1109/icccnt51525.2021.9580104","title":"Mitigating unsecured data forwarding related attack of underwater sensor network","display_name":"Mitigating unsecured data forwarding related attack of underwater sensor network","publication_year":2021,"publication_date":"2021-07-06","ids":{"openalex":"https://openalex.org/W3212572738","doi":"https://doi.org/10.1109/icccnt51525.2021.9580104","mag":"3212572738"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt51525.2021.9580104","pdf_url":null,"source":{"id":"https://openalex.org/S4363607876","display_name":"2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090045753","display_name":"Ashish Hariyale","orcid":null},"institutions":[{"id":"https://openalex.org/I11880225","display_name":"National Institute of Technology Karnataka","ror":"https://ror.org/01hz4v948","country_code":"IN","type":"funder","lineage":["https://openalex.org/I11880225"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ashish Hariyale","raw_affiliation_strings":["National Institute of Technology Karnataka,Department of Computer Science and Engineering,Mangalore,India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology Karnataka,Department of Computer Science and Engineering,Mangalore,India","institution_ids":["https://openalex.org/I11880225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005226005","display_name":"Aakriti Thawre","orcid":null},"institutions":[{"id":"https://openalex.org/I11880225","display_name":"National Institute of Technology Karnataka","ror":"https://ror.org/01hz4v948","country_code":"IN","type":"funder","lineage":["https://openalex.org/I11880225"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Aakriti Thawre","raw_affiliation_strings":["National Institute of Technology Karnataka,Department of Computer Science and Engineering,Mangalore,India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology Karnataka,Department of Computer Science and Engineering,Mangalore,India","institution_ids":["https://openalex.org/I11880225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009427723","display_name":"B. R. Chandavarkar","orcid":"https://orcid.org/0000-0001-6944-875X"},"institutions":[{"id":"https://openalex.org/I11880225","display_name":"National Institute of Technology Karnataka","ror":"https://ror.org/01hz4v948","country_code":"IN","type":"funder","lineage":["https://openalex.org/I11880225"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"B. R. Chandavarkar","raw_affiliation_strings":["National Institute of Technology Karnataka,Department of Computer Science and Engineering,Mangalore,India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology Karnataka,Department of Computer Science and Engineering,Mangalore,India","institution_ids":["https://openalex.org/I11880225"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.3,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.863194,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":75,"max":78},"biblio":{"volume":"9","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11192","display_name":"Underwater Vehicles and Communication Systems","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/2212","display_name":"Ocean Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11192","display_name":"Underwater Vehicles and Communication Systems","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/2212","display_name":"Ocean Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9741,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9291,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/underwater-acoustic-communication","display_name":"Underwater acoustic communication","score":0.705686},{"id":"https://openalex.org/keywords/packet-forwarding","display_name":"Packet forwarding","score":0.6041862}],"concepts":[{"id":"https://openalex.org/C98083399","wikidata":"https://www.wikidata.org/wiki/Q3246517","display_name":"Underwater","level":2,"score":0.7435255},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7311658},{"id":"https://openalex.org/C169111936","wikidata":"https://www.wikidata.org/wiki/Q424098","display_name":"Underwater acoustic communication","level":3,"score":0.705686},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.66677034},{"id":"https://openalex.org/C120317029","wikidata":"https://www.wikidata.org/wiki/Q874048","display_name":"Packet forwarding","level":3,"score":0.6041862},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.48065436},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.42290002},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.41414434},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3967929},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.39445335},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16174102},{"id":"https://openalex.org/C111368507","wikidata":"https://www.wikidata.org/wiki/Q43518","display_name":"Oceanography","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt51525.2021.9580104","pdf_url":null,"source":{"id":"https://openalex.org/S4363607876","display_name":"2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.73,"id":"https://metadata.un.org/sdg/14","display_name":"Life below water"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":14,"referenced_works":["https://openalex.org/W1501167349","https://openalex.org/W1906577849","https://openalex.org/W1982909553","https://openalex.org/W2014715688","https://openalex.org/W2017176661","https://openalex.org/W2075287959","https://openalex.org/W2112525087","https://openalex.org/W2149472588","https://openalex.org/W2161437547","https://openalex.org/W2171273926","https://openalex.org/W2619395208","https://openalex.org/W2803924868","https://openalex.org/W2901904672","https://openalex.org/W3005736927"],"related_works":["https://openalex.org/W46613192","https://openalex.org/W4285703999","https://openalex.org/W4225540233","https://openalex.org/W3081304190","https://openalex.org/W2556643280","https://openalex.org/W2539461158","https://openalex.org/W2477841276","https://openalex.org/W2353494610","https://openalex.org/W2185568765","https://openalex.org/W1989468614"],"abstract_inverted_index":{"To":[0],"improve":[1],"communication":[2,54,86,192],"underwater,":[3],"the":[4,37,70,106,111,134,198],"underwater":[5,14,47,57,85,107,181],"sensor":[6,182],"networks":[7,108,114],"(UWSN)":[8],"provide":[9],"gains":[10],"for":[11,115],"many":[12,45,116],"different":[13,117],"applications,":[15],"like":[16,88,120],"Underwater":[17,26,63,72],"Data-centers,":[18],"Aquatic":[19,24],"Monitoring,":[20,25],"Tsunami":[21],"Monitoring":[22],"Systems,":[23],"Oil":[27],"Field":[28],"Discovery,":[29],"Submarine":[30,41],"Target":[31,42],"Localization,":[32],"Surveilling":[33],"Water":[34],"Territory":[35],"of":[36,69,84,110,179,200,208],"Country":[38],"via":[39],"UWSN,":[40],"Localization":[43],"and":[44,100,136,157,193,206,210],"more.":[46],"applications":[48],"are":[49],"dependent":[50],"on":[51,214],"secure":[52,191],"data":[53,73,175],"in":[55,62],"an":[56,180],"environment,":[58],"so":[59,101],"Data":[60],"transmission":[61,74],"Sensor":[64],"Network":[65],"is":[66,76],"a":[67,77,150,170,187],"need":[68],"future.":[71],"itself":[75],"big":[78],"challenge":[79],"due":[80],"to":[81,130,133,141,172,190,196],"various":[82],"limitations":[83],"mediums":[87],"lower":[89],"bandwidth,":[90],"multipath":[91],"effect,":[92],"path":[93],"loss,":[94],"propagation":[95],"delay,":[96],"noise,":[97],"Doppler":[98],"spread,":[99],"on.":[102],"These":[103],"challenges":[104],"make":[105],"one":[109],"most":[112],"vulnerable":[113],"security":[118],"attacks":[119,178],"sinkhole,":[121],"spoofing,":[122],"wormhole,":[123],"misdirection,":[124],"etc.":[125],"It":[126],"causes":[127],"packets":[128,153],"unable":[129],"be":[131,149],"delivered":[132],"destination,":[135],"even":[137],"worse":[138],"forward":[139],"them":[140,160],"malicious":[142,165],"nodes.":[143],"A":[144],"compromised":[145],"node,":[146],"which":[147],"may":[148],"router,":[151],"intercepts":[152],"going":[154],"through":[155],"it,":[156],"selectively":[158],"drops":[159],"or":[161],"can":[162],"perform":[163],"some":[164],"activity.":[166],"This":[167],"paper":[168],"presents":[169],"solution":[171,185],"Mitigate":[173],"unsecured":[174],"forwarding":[176],"related":[177],"network,":[183],"our":[184],"uses":[186],"pre-shared":[188],"key":[189],"hashing":[194],"algorithm":[195],"maintain":[197],"integrity":[199],"stored":[201],"locations":[202],"at":[203],"head":[204],"node":[205],"demonstration":[207],"attack":[209],"its":[211],"mitigation":[212],"done":[213],"Unetstack":[215],"software.":[216]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3212572738","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2025-04-22T01:47:35.061129","created_date":"2021-11-22"}